Submissions

Jing Deng

Dr. Jing Deng is an assistant professor in the Department of Computer Science (CS) at the University of North Carolina at Greensboro (UNCG). Dr. Deng visited the Department of Electrical Engineering at Princeton University and the Department of Electrical and Computer Engineering, WINLAB at Rutgers University in Fall of 2005. He was with the Department of Computer Science at the University of New Orleans from 2004 to 2008. He served as a Research Assistant Professor in the Department of Electrical Engineering & Computer Science at Syracuse University from 2002 to 2004. He received his Ph.D. degree from School of Electrical and Computer Engineering at Cornell University, Ithaca, NY in January, 2002.
Dr. Deng is an associate editor of IEEE Transactions on Vehicular Technology (TVT).
Dr. Deng's research focuses include wireless network security, information assurance, mobile ad hoc networks, and wireless sensor networks.

We study routing misbehavior in MANETs (Mobile Ad Hoc Networks) in this paper. In general, routing protocols for
MANETs are designed based on the assumption that all participating nodes are fully cooperative. However, due to the open structure
and ...

In order to improve the throughput performance
of Medium Access Control (MAC) schemes in wireless communication networks, some researchers proposed to divide a single shared channel into several sub-channels: one as control subchannel
and the other...

In this work, we analyze and evaluate the maximum
achievable throughput of split-channel MAC schemes that are
based on the RTS/CTS (Ready-To-Send/Clear-To-Send) dialogue
and that rely on pure ALOHA or on p-persistent Carrier Sensing
Multip...

Broadcast is a fundamental operation in wireless networks, and nai¨ve flooding is not practical, because it cannot deal
with interference. Scheduling is a good way of avoiding interference, but previous studies on broadcast scheduling algorithms all...

In ad hoc networks, the hidden- and the exposed-terminal
problems can severely reduce the network capacity on
the MAC layer. To address these problems, the ready-to-send
and clear-to-send (RTS/CTS) dialogue has been proposed in
the literature. Ho...

We evaluate the performance of an opportunistic multi-channel medium access control protocol and compare it to that of the corresponding single-channel MAC (S-MAC) and a non-opportunistic multi-channel MAC (M-MAC). We do this in three different setti...

Multi-hop infrastructure-based communication is expected to play a vital role in supporting high data-rate multimedia access to mobile devices. The advantages are significant in highly mobile scenarios such as intra-vehicular networks. However, mobil...

To achieve security in wireless sensor networks, it is important to be able to encrypt messages sent among sensor nodes.
Keys for encryption purposes must be agreed upon by communicating nodes. Due to resource constraints, achieving such key
agreem...

Studies of ad hoc wireless networks are a relatively new field gaining more popularity for various new applications. In these networks, the Medium Access Control (MAC) protocols are responsible for coordinating the access from active nodes. These pro...

The success of Wireless Sensor Networks (WSNs) depends largely on efficient information delivery from target areas toward data sinks. The problem of data forwarding is complicated by the severe energy constraints of sensors in WSNs. In this work, we ...

In random key predistribution techniques for wireless sensor networks, a relatively small number of keys are randomly
chosen from a large key pool and are loaded on the sensors prior to deployment. After deployment, each sensor tries finding a
comm...

To improve the channel throughput and the fairness
of random access channels, we propose a new backoff algorithm,
namely, the sensing backoff algorithm (SBA). A novel feature of
the SBA scheme is the sensing mechanism, in which every node
modifie...

We focus on the problem of finding the best search set for expanding ring search (ERS) in wireless networks. ERS is widely used to locate randomly selected destinations or information in wireless networks such as wireless sensor networks In ERS, cont...

Price dispersion of a homogeneous product reflects market efficiency and has significant implications on sellers’ pricing strategies. Two different perspectives, the supply and demand perspectives, can be adopted to examine this phenomenon. The forme...

The transmission range that achieves the most economical
use of energy in wireless ad hoc networks is studied for
uniformly distributed network nodes. By assuming the existence
of forwarding neighbors and the knowledge of their locations, the
ave...

To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent between sensor nodes. Before doing so, keys for performing encryption and authentication must be agreed upon by the communicating pa...

In order to conserve battery power in very dense sensor networks, some sensor nodes may be put into the sleep state while other sensor nodes remain active for the sensing and communication tasks. In this paper, we study the node sleep scheduling prob...

Contention-based Geographic Forwarding (CGF) is
a state-free forwarding technique. In this paper, we develop a
general analytical framework to evaluate the performance of CGF
with different forwarding areas in wireless multi-hop networks. In
part...

In wireless sensor networks, data fusion is often performed in order to reduce the overall message transmission from the sensors toward the base station. We investigate the problem of data fusion assurance in multi-level data fusion or transmission i...